L2 security and WLANs exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Network engineer is troubleshooting newly deployed wireless network that is using latest 802.11 standards. When users access high bandwidth services such as streaming video, wireless network performance is poor. To improve performance the network engineer decides to configure 5 GHz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve wireless network performance for that type of service?

5 GHz band has more channels and is less crowded than 2.4 GHz band, which makes it more suited to streaming multimedia.

2.4GHz

802.11 b, g, n, and ax

What wireless standard provides data rates up to 1.3Gb/s?

802.11ac

Which 802.11 standards operate at 5Ghz

Ac, ax, a, and n

Two PCs are connected in wireless peer-to-peer topology. What is topology called?

Ad hoc

Purpose of TACACS+ (Terminal Access Controller Access Control Server)?

Authenticate a user against a central database

Which element of AAA is implemented either locally or as server-based solution? What term describe records what users do and what they access and performs client authentication

Authentication

Which feature on switch makes it vulnerable to VLAN hopping attacks?

Automatic trunking port feature enabled for all ports by default

Which type of management frame may regularly be broadcast by AP?

Beacon

Authenticator

Controls physical access to network based on client authentication status

NAT (Network Address Translation)

Converts private IP addresses into public globally reputable ones Service is used on the wireless router that allow the employee laptops to access the internet when a network administrator deploys a wireless router in a small law firm. Employee laptops join the WLAN and receive IP addresses in the 10.0.10.0/24 network.

Which two Cisco solutions help prevent DHCP starvation attacks?

DHCP snooping Port security

What is the technique or method called by VLAN hopping attack may be perpetrated (performed)?

Double-tagging

How do you prevent rogue switch from establishing trunk to enabled ports with default configuration on legitimate switch?

Enable BPDU guard and PortFast Disable DTP

A laptop cannot connect to wireless access point. Which two troubleshooting steps should be taken first?

Ensure that wireless NIC is enabled and wireless SSID is chosen

What is the wireless security mode called when authentication server is used to authenticate users?

Enterprise

What does switch do when it's MAC address table is full?

Flood all incoming frames within local VLAN (virtual local area network) and LAN.

Security violation mode on port is restrict. What happens when security violation occurs?

Frames with unknown source addresses are dropped until enough MAC addresses are removed or maximum allowable address is increased Syslog notifications are send Security violation counter increments by one

The security violation mode on port is protect. What happens when security violation occurs?

Frames with unknown source addresses are dropped until enough secure MAC addresses are removed or maximum allowable address is increased No syslog notifications are send

The beacon is regularly broadcast by AP. What is the purpose of beacon?

Identify network (SSID)

Network administrator is configuring (put together) RADIUS server connection on Cisco 3500 series WLC. Configuration requires shared secret password. What is the purpose for shared secret password?

It is used to encrypt (hide) messages between WLC and RADIUS server.

What is the authentication method called that stores usernames and passwords in a router or a switch?

Local AAA

Network administrator is working to improve WLAN performance on dual-band wireless router. What is a simple way to achieve split-the-traffic result?

Make sure that different SSIDs are used for 2.4 GHz and 5 GHz bands.

Sources of accidental interference

Microwave Cordless Landline Phone Wireless Gadgets (loT) Fluorescent/Christmas Light

For what purpose is the SNMP protocol?

Monitoring and changing device configurations

What is the purpose for secret password shared between WLC (wireless LAN controller) and radius server?

Mutual authentication and encryption

Which feature or configuration on switch makes it vulnerable (unguarded) to VLAN double-tagging attacks?

Native VLAN of trunking port being the same as user VLAN

What is the function provided by CAPWAP (Control and Provisioning of Wireless Access Points) protocol in corporate wireless network?

Provides encapsulation and forwarding of wireless user traffic between access point and wireless LAN controller.

Which feature on a wireless router may be used to prioritize (treat) traffic?

Qos

What are two methods that are used by wireless NIC to discover AP?

Receiving broadcast beacon frame Transmitting probe request

Supplicant

Requires access and responds to requests to from switch

Which protocol can be used to monitor network?

SNMP (Simple Network Management Protocol)

Which three parameters would need to be changed if best practices are being implemented for home wireless AP?

SSID wireless network and AP password

What is the term used when beacon on AP is disabled? What term describes clients will have to manually identify SSID to connect to network.​

SSID cloaking

Passive

SSID is broadcast so that name of wireless network will appear in listing of available wireless networks for clients

When AP (access point) is configured as active, what must clients first do to being association process?

Send probe request

ip arp inspection validate src-mac What is the effect of applying the above command to switch port?

Source MAC address in Ethernet header is checked against senders MAC address in frame payload (ARP body)

Technician is troubleshooting slow WLAN that consists of 802.11b and 802.11g devices . New 802.11n/ac dual-band router has been deployed on network to replace old 802.11g router. What can technician do to address slow wireless speed?

Split wireless traffic between 802.11n 2.4 GHz band and 5 GHz band.

All switches on network are configured to automatically learn MAC addresses for each port. Business loses power in bad storm. When switches are brought back online, dynamically learned MAC addresses are retained. Which port security configuration enabled this?

Switchport port-security mac-address sticky

What is unique about channel 1, 6, 11 in 2.4 GHz band?

They are non-overlapping which means they will not interfere with each other

What is the purpose of RADIUS (Remote Authentication Dial-In User Service)?

To authenticate (prove) users against central database Server that allows network administrator of a college to configure WLAN user authentication process. Wireless users are required to enter username and password credentials that will be verified by server

Active

Used to configure access point so that clients must know SSID to connect to access point

Which type of VLAN-hopping attack may be prevented by designating (assign) unused VLAN as native VLAN?

VLAN double hopping

What layer 2 attack can happen because default for Cisco switch ports is dynamic auto?

VLAN hopping

Which type of wireless network is suitable for providing wireless access to city or district?

Wireless MAN (metropolitan area network)

Which type of wireless network commonly uses Bluetooth or Zigbee devices?

Wireless PAN (Personal-Area network)

Which type of wireless network uses transmitters to provide coverage over extensive geographic area?

Wireless WAN

Which type of wireless network uses transmitters to cover medium-sized network, usually up to 300 feet (91.4 meters)?

wireless local-area network

Authorization

Determines what resources users can access or operations they are allowed to perform

Accounting

Determines which resources users access and which operations they performed

What is the security best practices concerning CDP and LLDP

Disable CDP on edge ports that connect to untrusted ports Disable them entirely Disable both protocols on all interfaces where they are not required.

Three techniques for mitigating VLAN attacks?

Disable DTP (Dynamic Trunking Protocol) Statically configure all trunks Set Native VLAN to unused VLAN

What is DHCP (Dynamic Host Configuration Protocol) starvation attack and what is the result?

Exhaust (use) all available IP addresses Legitimate (confirming) clients cannot lease (take) addresses

What is the effect of using different SSIDs on 2.4 and 5GHz bands?

Improves network performance by segmenting traffic

What is the topology called when access points are used to allow connected PCs access to wired network?

Infrastructure

Which tab on 3405 WLC allows admin to configure specific security option like WPA2 (Wi-Fi Protected Access 2)?

WLANs


संबंधित स्टडी सेट्स

Chapter 18: The Heart and Cardiovascular System Function

View Set

Advanced professional development

View Set

CollegeBoard PPC: Ch 8-9 Unit 5 APWH 1750-1900

View Set

NMLS Practice Test "LOAN ORIGINATION & UNDERWRITING" Part 7-2

View Set

ATI Video Case Study: Survival Potential

View Set

Chapter 14: Nursing Management During Labor and Birth

View Set

Week Two- Documenting, Vitals, Wound Care, & Pain

View Set